Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

7-Zip Vulnerabilities Allowing Remote Code Execution

Two critical vulnerabilities in 7-Zip’s handling of ZIP archives have emerged, enabling remote attackers to execute arbitrary code by exploiting directory traversal flaws. Both issues stem from improper processing of symbolic links within ZIP files, allowing crafted archives to force…

PoC Released for Linux Kernel ksmbd Filesystem Vulnerability

Security researcher Norbert Szetei published the final installment of his deep-dive into the ksmbd filesystem module, culminating in a working proof-of-concept exploit targeting CVE-2025-37947. Unlike earlier use-after-free candidates that required complex race conditions or depended on external factors, this vulnerability…

Polymorphic Python Malware That Mutates Every Time It Runs

A newly spotted Python remote access trojan (RAT) on VirusTotal employs advanced polymorphic and self-modifying techniques, allowing it to alter its code signature on every execution and evade detection. Security researchers examining VirusTotal submissions identified a suspicious Python RAT (SHA256:7173e20e7ec217f6a1591f1fc9be6d0a4496d78615cc5ccdf7b9a3a37e3ecc3c)…

Chinese Hackers Weaponize Nezha Tool to Run Commands on Web Servers

Security researchers have uncovered a sophisticated cyberattack campaign where Chinese threat actors are exploiting web applications using an innovative log poisoning technique to deploy web shells and subsequently weaponize Nezha, a legitimate server monitoring tool, for malicious command execution. Creative…

Top 10 Best Supply Chain Intelligence Security Companies in 2025

In 2025, securing global supply chains is one of the top priorities for enterprises seeking business continuity, data integrity, and resilience against threats. As cyber risks, fraud, and disruption increase across physical and digital networks, leaders must adopt robust intelligence…

Top 10 Best Fraud Prevention Companies in 2025

Fraud prevention has become one of the most important priorities for enterprises, financial institutions, and digital-first businesses in 2025. With rising cyber threats, account takeovers, synthetic identities, financial crimes, phishing, and social engineering attacks, the need for advanced fraud detection…